PT-2026-37092 · Redis · Redis-Server
Emil Lerner
·
Published
2026-05-05
·
Updated
2026-05-05
·
CVE-2026-25243
CVSS v4.0
7.7
High
| Vector | AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
redis-server versions prior to 8.6.3
Description
Redis is an in-memory data structure store. The
RESTORE command fails to properly validate serialized values. An authenticated attacker with permissions to execute this command can provide a crafted serialized payload, triggering invalid memory access which may lead to remote code execution.Recommendations
Update to version 8.6.3.
Restrict access to the
RESTORE command using ACL rules as a temporary workaround.Fix
Heap Based Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Redis-Server